[1]
O. Owolafe and A. F. Thompson, “Analysis of Crypto-Ransomware Using Network Traffic”, JISCR, vol. 5, no. 1, pp. 76-83, Jun. 2022.